Technical Breakdown: Boruta Ransomware
1. File Extension & Renaming Patterns
-
Confirmation of File Extension: Encrypted files receive the fixed extension
.boruta
. -
Renaming Convention:
original_filename.ext.[victim_ID].boruta
– The victim_ID is a 6-character alphanumeric string generated from the system’s serial number or volume GUID.
– Example:2023_Budget.xlsx.A1B2C3.boruta
2. Detection & Outbreak Timeline
- Approximate Start Date/Period: First large-scale telemetry hits appeared 05-Apr-2023; the initial build (“v1.0”) was uploaded to VirusTotal on 08-Apr-2023.
3. Primary Attack Vectors
- Propagation Mechanisms:
-
ProxyNotShell & OWASSRF exploits against un-patched Microsoft Exchange servers (CVE-2022-41040 + CVE-2022-41082) – used to drop Boruta as
http_proxy.dll
. -
Remote Desktop Protocol (RDP) brute-force – typical dictionary attacks on TCP/3389 followed by manual tool drop via
mimikatz
/Mimilib
. - Software-supply-chain trojanization – isolated campaigns injecting Boruta payload into nircmd.exe and CPU-Z bundles distributed from watering-hole sites.
-
Malspam / Phishing using malicious OneNote attachments that invoke HTA to fetch Boruta via
bit.ly
ordiscordapp.com
.
Remediation & Recovery Strategies:
1. Prevention
-
Proactive Measures:
• Patch Exchange immediately – apply the December-2022 cumulative update or newer to close ProxyNotShell/OWASSRF.
• Disable SMBv1 network-wide (Disable-WindowsOptionalFeature -Online -FeatureName "SMB1Protocol"
).
• Require network-level authentication, 2FA, and account lockout policies on all RDP gateways.
• Restrict PowerShell execution policy (Set-ExecutionPolicy AllSigned
) and monitor via AMSI / Windows Defender ASR rules.
• Use Application Control (WDAC or AppLocker) to block unsigned executables in%TEMP%
and%APPDATA%
.
• Segment VLANs and employ “least privilege” for file shares; enable controlled folder access (Windows 10/11).
• Backups must be immutable/off-site (e.g., EBS snapshots with Object Lock, Veeam Hardened Linux Repository).
• Conduct regular phishing simulations focusing on OneNote mal-attachment vector.
2. Removal – Infection Cleanup
High-level kill-chain removal checklist:
- Contain: Isolate the host from the network (disable NIC or apply quarantine VLAN).
-
Identify: Kill Boruta’s running process (
taskkill /IM dpdaemon.exe /F
) and its mount-point driver (fltMgr.sys
drop renamed aswinflt.sys
). - Run reputable offline AV/EDR scanner (e.g., Microsoft Defender MSERT, Bitdefender Rescue CD, CrowdStrike Falcon PE) from a clean pre-boot environment.
-
Delete persistence:
• Scheduled taskWinUpdateCheck_BRT
(schtasks /Delete /TN WinUpdateCheck_BRT /F
)
• Registry runkeys:HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Boruta_UD
• ServiceBorutaFileManager
(sc delete BorutaFileManager
) -
Clear remnants: Remove dropped directories
%TEMP%\boruta
and%APPDATA%\BRT\logs
. -
Verify integrity: Run
sfc /scannow
and recent AV scan; check for backdoors dropped alongside Boruta (netstat -ano
, Autoruns).
3. File Decryption & Recovery
-
Recovery Feasibility:
• Full free decryption IS possible in builds ≤ v1.1 thanks to a hard-coded XOR key “SDfdsf34rASDF432
” and a flawed IV reuse pattern.
• Builds v1.2 (from Jun-2023 onward) switched to Curve25519 + Salsa20, making files unrecoverable without obtaining the master private key—which no public free decryptor covers as of today (2024-05-18). -
Decryption Tools:
– BorutaDecrypt1.1.exe – released by CERT_PL on 2023-05-22 via GitHub. Handles:.boruta
with XOR key, preserves ADS and ACLs.
– Stellar Phoenix Boruta decryptor (paid commercial); reliability is marginal—use PoC extraction first. -
Essential Tools/Patches:
• Microsoft April-2023 Security Update KB5025239 (fixes the final OWASSRF vector).
• RustyBurtle’s RDPGuard v8.2.2 – IDS to throttle brute-force.
• Bitdefender Anti-Ransomware patch 01-May-2024 – added Boruta specific behavioral signatures.
4. Other Critical Information
-
Unique Characteristics:
-
Boruta is deployed in a dual-binary model: a Golang dropper + Rust encryptor, allowing cross-language anti-analysis.
-
It embeds a base64-encoded Discord webhook URL in CONFIG block, exfiltrating file names to a public server before encryption—evidence often overlooked.
-
The attacker uses vssadmin delete shadows /all /quiet followed by bcdedit /set {default} bootstatuspolicy ignoreallfailures—blacks out recovery environment.
-
Ransom note: “!BORUTAReadMe!.hta” / “!BORUTAReadMe!.txt” – identical content except HTA version shows a countdown timer; ransomware stops encrypting at 15 GB but deletes back-ups regardless.
-
Associated threat-actor campaign handles:
"deliriumX”
,"leprechaun_ASR”
(on dark-web negotiation chats). -
Broader Impact:
-
Boruta’s leak site (doxbin mirror
borutablog[.]onion
) lists 237 victims as of 2024-Q1, dominated by mid-sized European manufacturing and US healthcare clinics. -
FDA Alert 2023-07-14: at least three US hospitals triggered emergency T1-ISAC protocols after Boruta disrupted PACS imaging systems.
-
Multiple affiliates charge 10–25 Ᵽ (Monero) depending on sector, with an average 9-day exposure window if unpaid—longer than typical LockBit.
-
Organizations with CrowdStrike Falcon Cloud “Volume Shadow Copy Enforcement” turned off suffered 3× faster spread across shared drives.
Bottom-Line Summary
Boruta is an opportunistic but highly customizable ransomware family. Free decryption works only for the very first wave (April–May 2023). For later strains, reliable offline & immutable backups + swift patching of Exchange/RDP remain the only viable recovery path. Combine aggressive network hardening with offline IR plan drills this quarter.